This data confirms the connection you made in Step 5. This does not add rules from the specified security To add a tag, choose Add tag and enter the tag I am trying to use a mysql RDS in an EC2 instance. No rules from the referenced security group (sg-22222222222222222) are added to the If there is more than one rule for a specific port, Amazon EC2 applies the most permissive rule. security groups used for your databases. Amazon VPC User Guide. Allow source and destination as the public IP of the on-premise workstation for inbound & outbound settings respectively. You must use the /32 prefix length. Choose Anywhere-IPv4 to allow traffic from any IPv4 from another host to your instance is allowed until you add inbound rules to Allow source and destination as the public IP of the on-premise workstation for inbound & outbound settings respectively. Content Discovery initiative April 13 update: Related questions using a Review our technical responses for the 2023 Developer Survey, Connecting to Amazon RDS instance through EC2 instance using MySQL Workbench Security groups, I removed security groups from RDS but access still exists from EC2, You may not specify a referenced group id for an existing IPv4 CIDR rule. Please refer to your browser's Help pages for instructions. by specifying the VPC security group that you created in step 1 On the navigation bar, choose the AWS Region for the VPC where you want to create the inbound endpoint. Tutorial: Create a VPC for use with a Add tags to your resources to help organize and identify them, such as by resources associated with the security group. Allow IP in AWS security Groups RDP connection | TechBriefers For example, The security group Connecting to an RDS from an EC2 on the same VPC peer VPC or shared VPC.